Search results
1 – 10 of 165Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…
Abstract
Purpose
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.
Design/methodology/approach
Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).
Findings
The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.
Practical implications
Based on the findings, the authors provided several implications for app stores, app developers and app marketers.
Originality/value
This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.
Details
Keywords
Neena Sinha, Sanjay Dhingra, Ritu Sehrawat, Varnika Jain and Himanshu Himanshu
The emergence of virtual reality (VR) has the potential to revolutionize various industries, including tourism, as it delivers a simulated environment that closely emulates…
Abstract
Purpose
The emergence of virtual reality (VR) has the potential to revolutionize various industries, including tourism, as it delivers a simulated environment that closely emulates real-life experiences. Therefore, this study aims to explore how the factors, i.e. enjoyment, emotional involvement, flow state, perceived privacy risk, physical risk and cost, influence the customers’ intention to use VR for tourism.
Design/methodology/approach
This study integrates the technology acceptance model, hedonic consumption theory with other factors, including cognitive response, authenticity, perceived privacy risk, perceived physical risk, perceived cost and perceived presence. Partial least squares structural equation modelling approach was used to test the proposed research model.
Findings
The finding based on the sample of 252 respondents revealed that authenticity is the most influential factor impacting behavior intention followed by perceived cost, attitude, cognitive response and enjoyment. Also, the study supported the moderating impact of personal innovativeness between attitude and behavioral intention to use VR for tourism.
Practical implications
The findings of the study offers practical implications for service providers, site managers, destination marketers, tourist organizations and policymaker to develop more effective strategies for offering VR services for tourism.
Originality/value
This study enriches the current understanding of VR adoption in context of tourism with empirical evidences.
Details
Keywords
Meenakshi Handa, Ronika Bhalla and Parul Ahuja
Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…
Abstract
Purpose
Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.
Design/methodology/approach
Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.
Findings
The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.
Research limitations/implications
This study is limited to a population of young adults in the age group of 18–25 years.
Practical implications
The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.
Originality/value
This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.
Details
Keywords
Jawahitha Sarabdeen and Mohamed Mazahir Mohamed Ishak
General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the…
Abstract
Purpose
General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the EU, it created an extra-territorial effect through Articles 3, 45 and 46. Extra-territorial effect refers to the application or the effect of local laws and regulations in another country. Lawmakers around the globe passed or intensified their efforts to pass laws to have personal data privacy covered so that they meet the adequacy requirement under Articles 45–46 of GDPR while providing comprehensive legislation locally. This study aims to analyze the Malaysian and Saudi Arabian legislation on health data privacy and their adequacy in meeting GDPR data privacy protection requirements.
Design/methodology/approach
The research used a systematic literature review, legal content analysis and comparative analysis to critically analyze the health data protection in Malaysia and Saudi Arabia in comparison with GDPR and to see the adequacy of health data protection that could meet the requirement of EU data transfer requirement.
Findings
The finding suggested that the private sector is better regulated in Malaysia than the public sector. Saudi Arabia has some general laws to cover health data privacy in both public and private sector organizations until the newly passed data protection law is implemented in 2024. The finding also suggested that the Personal Data Protection Act 2010 of Malaysia and the Personal Data Protection Law 2022 of Saudi Arabia could be considered “adequate” under GDPR.
Originality/value
The research would be able to identify the key principles that could identify the adequacy of the laws about health data in Malaysia and Saudi Arabia as there is a dearth of literature in this area. This will help to propose suggestions to improve the laws concerning health data protection so that various stakeholders can benefit from it.
Details
Keywords
Yu Wang, Daqing Zheng and Yulin Fang
The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore…
Abstract
Purpose
The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore the factors that influence the information-control behavior of ESN users when continuously sharing information.
Design/methodology/approach
This study specifies the information-control behaviors in the “wall posts” channel and applies communication privacy management (CPM) theory to analyze the effects of the individual-specific factor (disposition to value information), context-specific factors (work-relatedness and information richness) and risk-benefit ratio (public benefit and public risk). Data on actual information-control behaviors extracted from ESN logs are examined using multilevel mixed-effects logistic regression analysis.
Findings
The study's findings show the direct effects of the individual-specific factor, context-specific factors and risk-benefit ratio, highlighting interactions between the individual motivation factor and ESN context factors.
Originality/value
This study reshapes the relationship of CPM theory boundary rules in the ESN context, extending information-control research and providing insights into ESNs' information-control practices.
Details
Keywords
Anthony Sumnaya Kumasey, Farhad Hossain, Aminu Mamman and Eric Delle
Concerns regarding the dysfunctional behaviours of public officials have sparked renewed interest in public service ethics and spirituality. While national and organizational…
Abstract
Purpose
Concerns regarding the dysfunctional behaviours of public officials have sparked renewed interest in public service ethics and spirituality. While national and organizational systems have been established to eliminate dysfunctional behaviours such as corruption, sexual harassment and misuse of confidential information, the practice continues to have a demoralizing impact on developing countries. The study aims to intend to investigate the empirical relation between the application of spirituality and ethics in reducting dysfunctional behaviours within Ghana's Public Sector.
Design/methodology/approach
The study conducted a qualitative case analysis that utilized 28 semi-structured interviews and four focus groups. Interviews and group discussions with public sector staff, managers and policymakers were used to collect qualitative data. This approach facilitated an in-depth investigation into their views on dysfunctional actions and the possible impact of workplace spirituality and ethics in the Ghanaian public service.
Findings
The study uncovered a persistent recurrence of dysfunctional behaviours, such as fraudulent activities, resource misuse, unofficial work and inappropriate use of official time. There was uncertainty regarding the effectiveness of integrating ethics and spirituality to curtail dysfunctional behaviours. Nevertheless, the results supported adopting spiritual and ethical rejuvenation in the public service as a universal solution to overcome these behaviours.
Originality/value
This study enhances comprehension of dysfunctional behaviours in Ghana's public service by providing insights into how spirituality and ethics can transform it. The potentials of workplace spirituality and ethics can lead to a strong public service that embodies accountability, integrity and effectiveness, thereby serving as a pivotal device for Ghana's holistic advancement.
Details
Keywords
Kristen L. Walker and George R. Milne
The authors argue that privacy is integral to the well-being of consumers and an essential component in not only corporate social responsibility (CSR) but what they term uniquely…
Abstract
Purpose
The authors argue that privacy is integral to the well-being of consumers and an essential component in not only corporate social responsibility (CSR) but what they term uniquely as social media responsibility (SMR). A conceptual framework is proposed that delineates the privacy issues companies should pay attention to in artificial intelligence (AI)-fueled social media environments.
Design/methodology/approach
The authors review literature on privacy issues in social media and AI in the academic and practitioner literatures. Based on the review, arguments focus on the need for an SMR framework, proposing responsible use of consumer data that is attentive to consumers' privacy concerns.
Findings
Implications from the framework are a path forward for social media companies to treat consumer data more fairly in this new environment. The framework has implications for companies to reduce potential harms to consumers and consider addressing their power and responsibility. With social media and AI transforming consumer behavior so profoundly, there are a variety of short- and long-term social implications.
Originality
Since AI tools are becoming integral to social media company activities, this research addresses the changing responsibilities social media companies have in securing consumers' data and enabling consumers the agency to protect their privacy effectively. The authors propose an SMR framework based on CSR research and AI tools employed by social media companies.
Details
Keywords
Princely Ifinedo, Francine Vachon and Anteneh Ayanso
This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.
Abstract
Purpose
This paper aims to increase understanding of pertinent exogenous and endogenous antecedents that can reduce data privacy breaches.
Design/methodology/approach
A cross-sectional survey was used to source participants' perceptions of relevant exogenous and endogenous antecedents developed from the Antecedents-Privacy Concerns-Outcomes (APCO) model and Social Cognitive Theory. A research model was proposed and tested with empirical data collected from 213 participants based in Canada.
Findings
The exogenous factors of external privacy training and external privacy self-assessment tool significantly and positively impact the study's endogenous factors of individual privacy awareness, organizational resources allocated to privacy concerns, and group behavior concerning privacy laws. Further, the proximal determinants of data privacy breaches (dependent construct) are negatively influenced by individual privacy awareness, group behavior related to privacy laws, and organizational resources allocated to privacy concerns. The endogenous factors fully mediated the relationships between the exogenous factors and the dependent construct.
Research limitations/implications
This study contributes to the budding data privacy breach literature by highlighting the impacts of personal and environmental factors in the discourse.
Practical implications
The results offer management insights on mitigating data privacy breach incidents arising from employees' actions. Roles of external privacy training and privacy self-assessment tools are signified.
Originality/value
Antecedents of data privacy breaches have been underexplored. This paper is among the first to elucidate the roles of select exogenous and endogenous antecedents encompassing personal and environmental imperatives on data privacy breaches.
Details
Keywords
This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money…
Abstract
Purpose
This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money laundering regimes of the UK and the USA.
Design/methodology/approach
The research draws upon the following sources. Firstly, statistics provided by the UK National Crime Agency, 2019 (NCA) regarding suspicious activity report (SAR) filing rates. Secondly, anti-money laundering legislation in the USA and UK. Thirdly, statements made in the political domain in the USA, particularly those which raised constitutional concerns during the progress of the Patriot Act 2001. Finally, statements and recommendations by a UK Parliamentary Commission enquiring into the effectiveness of the suspicious activity reporting regime.
Findings
The UK reporting regime does not accommodate professional judgement, resulting in the filing of SARs with limited intelligence value. This contrasts with discretionary reporting in the USA: voluntary reporting guides and influences auditor behaviour rather than mandating it. Defensive filing by UK auditors (defence to anti-money launderings [DAMLs]) has increased in recent years but the number of SARs filed has declined.
Originality/value
The study evaluates auditor behavioural responses to legislative regimes which mandate or alternatively accommodate discretion in the reporting suspicion of money laundering. Consideration of constitutional and judicial activism in this context is a novel contribution to the literature. For its theoretical framework the study uses Foucault’s concept of discipline of the self to evaluate auditor behaviour under both regimes.
Details